Kwelwild Posted April 9, 2013 Report Posted April 9, 2013 Abusing Windows Remote Management (Winrm) With Metasploit Description: In this technical webinar Devid Maloney talking about how you can exploit WinRM services using Metasploit Framework so what you will learn:• Capabilities of Windows Remote Management (WinRM) and Windows Remote Shell (WinRS)• Discovering hosts running these services• Brute forcing the services to obtain passwords• Running WMI Queries and running commands• Getting and migrating shells to a more persistent process and more.About David Maloney:David Maloney, a Software Engineer on Rapid7's Metasploit team, is responsible for development of core features for the commercial Metasploit editions. Before Rapid7, he worked as a Security Engineer and Penetration Tester at Time Warner Cable and as an Application Security Specialist for a global insurance company. David has been a long-time community contributor to the Metasploit Framework. He is one of the founders of Hackerspace Charlotte and is an avid locksport enthusiast.Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.Original Source: Sursa: Abusing Windows Remote Management (Winrm) With Metasploit Quote